Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Strengthening Linux Security: A Step-by-Step Guide to SSH Public Key Authentication
Cover image for Strengthening Linux Security: A Step-by-Step Guide to SSH Public Key Authentication

Strengthening Linux Security: A Step-by-Step Guide to SSH Public Key Authentication

1
Comments
2 min read
From Deprecated npm Classic Tokens to OIDC Trusted Publishing: A CI/CD Troubleshooting Journey
Cover image for From Deprecated npm Classic Tokens to OIDC Trusted Publishing: A CI/CD Troubleshooting Journey

From Deprecated npm Classic Tokens to OIDC Trusted Publishing: A CI/CD Troubleshooting Journey

6
Comments 1
5 min read
Authentication: JWTs vs. Sessions (My Study Notes)

Authentication: JWTs vs. Sessions (My Study Notes)

1
Comments
1 min read
AIDE Daily Automation Build - Checklist Your Implementation Roadmap

AIDE Daily Automation Build - Checklist Your Implementation Roadmap

Comments
2 min read
How to Prevent Software Piracy in C# Desktop Apps: A Complete Guide
Cover image for How to Prevent Software Piracy in C# Desktop Apps: A Complete Guide

How to Prevent Software Piracy in C# Desktop Apps: A Complete Guide

Comments
5 min read
🚀 Supercarga la Autenticación en NestJS con Firebase
Cover image for 🚀 Supercarga la Autenticación en NestJS con Firebase

🚀 Supercarga la Autenticación en NestJS con Firebase

2
Comments
3 min read
The Magic Behind “Login with Google”: How OAuth 2.0 Actually Works
Cover image for The Magic Behind “Login with Google”: How OAuth 2.0 Actually Works

The Magic Behind “Login with Google”: How OAuth 2.0 Actually Works

6
Comments
6 min read
OpenAI Mixpanel Breach 2025: What Happened, Who Was Affected, and What You Need to Know
Cover image for OpenAI Mixpanel Breach 2025: What Happened, Who Was Affected, and What You Need to Know

OpenAI Mixpanel Breach 2025: What Happened, Who Was Affected, and What You Need to Know

Comments
3 min read
Top 10 AWS Security Mistakes Beginners Must Avoid
Cover image for Top 10 AWS Security Mistakes Beginners Must Avoid

Top 10 AWS Security Mistakes Beginners Must Avoid

Comments
6 min read
Most APIs still handle oversized payloads incorrectly (and it’s a DoS problem)

Most APIs still handle oversized payloads incorrectly (and it’s a DoS problem)

Comments
1 min read
ZeroThreat in the AppSec Landscape: A Technical & Operational Assessment
Cover image for ZeroThreat in the AppSec Landscape: A Technical & Operational Assessment

ZeroThreat in the AppSec Landscape: A Technical & Operational Assessment

Comments
4 min read
How I Secured My Static Website at the Edge Using Amazon CloudFront
Cover image for How I Secured My Static Website at the Edge Using Amazon CloudFront

How I Secured My Static Website at the Edge Using Amazon CloudFront

Comments 2
4 min read
The 30-Minute Security Audit: A Static Analysis Protocol for Onboarding
Cover image for The 30-Minute Security Audit: A Static Analysis Protocol for Onboarding

The 30-Minute Security Audit: A Static Analysis Protocol for Onboarding

11
Comments 6
3 min read
I built a passwordless access system for cases where identity is not the primary concern

I built a passwordless access system for cases where identity is not the primary concern

1
Comments
1 min read
The Worst Thing to Happen to React and Next.js: React2Shell
Cover image for The Worst Thing to Happen to React and Next.js: React2Shell

The Worst Thing to Happen to React and Next.js: React2Shell

11
Comments 6
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.